Sign In
Upload
Manuals
Brands
Huawei Manuals
Switch
Quidway S3100 Series
Huawei Quidway S3100 Series Manuals
Manuals and User Guides for Huawei Quidway S3100 Series. We have
1
Huawei Quidway S3100 Series manual available for free PDF download: Operation Manual
Huawei Quidway S3100 Series Operation Manual (514 pages)
Brand:
Huawei
| Category:
Switch
| Size: 10.03 MB
Table of Contents
Section 1
10
Product Overview
9
Table of Contents
10
Chapter 1 Product Overview
11
Introduction
11
Technical Specifications
12
S3126C/S3116C/S3108C
12
S3126T/S3116T/S3108T
12
Service Features
13
S3126T/S3116T/S3108T
14
S3126C/S3116C/S3108C
16
Chapter 2 Network Design
19
MAN Access Solution
19
Education Network Solution
19
Section 2
22
Chapter 1 CLI Overview
23
Introduction to the CLI
23
Command Protection/Command View
23
Switching between User Levels
24
CLI Views
25
Configuring the Level of a Specific Command in a Specific View
25
CLI Features
29
Online Help
29
Terminal Display
30
Command History
31
Error Messages
31
Command Edit
32
Section 3
34
Chapter 1 Logging into an Ethernet Switch
36
Introduction to the User Interface
36
Logging into an Ethernet Switch
36
Supported User Interfaces
36
User Interface Number
36
Common User Interface Configuration
37
Chapter 2 Logging in through the Console Port
39
Introduction
39
Setting up the Connection to the Console Port
39
Common Configuration
41
Console Port Login Configuration
41
Console Port Login Configurations for Different Authentication Modes
42
Configuration Procedure
44
Console Port Login Configuration with Authentication Mode Being None
44
Configuration Example
45
Configuration Procedure
47
Console Port Login Configuration with Authentication Mode Being Password
47
Configuration Example
49
Configuration Procedure
50
Console Port Login Configuration with Authentication Mode Being Scheme
50
Configuration Example
53
Chapter 3 Logging in through Telnet
56
Introduction
56
Common Configuration
56
Telnet Configurations for Different Authentication Modes
57
Telnet Configuration with Authentication Mode Being None
58
Configuration Procedure
58
Configuration Example
60
Telnet Configuration with Authentication Mode Being Password
61
Configuration Procedure
61
Configuration Example
63
Telnet Configuration with Authentication Mode Being Scheme
65
Configuration Procedure
65
Configuration Example
69
Telnet Connection Establishment
70
Telneting to a Switch from a Terminal
70
Telneting to Another Switch from the Current Switch
72
Chapter 4 Logging in Using Modem
74
Introduction
74
Configuration on the Administrator Side
74
Configuration on the Switch Side
74
Modem Configuration
74
Switch Configuration
75
Modem Connection Establishment
76
Http Connection Establishment
79
Chapter 5 Logging in through Web-Based Network Management System
81
Introduction
83
Chapter 6 Logging in through NMS
83
Connection Establishment Using NMS
84
Chapter 7 Controlling Login Users
85
Introduction
85
Controlling Telnet Users
85
Controlling Telnet Users by Source IP Addresses
85
Prerequisites
85
Controlling Telnet Users by Source and Destination IP Addresses
86
Configuration Example
87
Controlling Network Management Users by Source IP Addresses
88
Prerequisites
88
Configuration Example
90
Controlling Web Users by Source IP Address
90
Configuration Example
91
Controlling Web Users by Source IP Addresses
91
Disconnecting a Web User by Force
91
Prerequisites
91
Section 4
94
Chapter 1 VLAN Configuration
95
Vlan Overview
95
Introduction to VLAN
95
VLAN Classification
96
VLAN Configuration
96
Basic VLAN Configuration
96
Creating Vlans in Batches
97
Configuring a Port-Based VLAN
97
Displaying a VLAN
97
VLAN Configuration Example
98
Section 5
101
Chapter 1 Management VLAN Configuration
102
Introduction to Management VLAN
102
Management VLAN
102
Static Route
102
Management VLAN Configuration
103
Configuring the Management VLAN
103
Prerequisites
103
Configuration Example
104
Displaying and Debugging Management VLAN
106
Chapter 2 DHCP/BOOTP Client Configuration
107
Introduction to DHCP Client
107
Introduction to BOOTP Client
109
DHCP/BOOTP Client Configuration
110
Configuring a DHCP/BOOTP Client
110
Prerequisites
110
Configuration Example
111
Section 6
113
Chapter 1 GVRP Configuration
114
Introduction to GVRP
114
GVRP Mechanism
114
GVRP Packet Format
116
Protocol Specifications
117
GVRP Configuration
117
Configuration Prerequisite
117
Configuration Procedure
117
Configuration Example
119
Displaying GVRP
119
Section 7
122
Chapter 1 Basic Port Configuration
123
Ethernet Port Overview
123
Types and Numbers of Ethernet Ports
123
Link Types of Ethernet Ports
123
Configuring the Default VLAN ID for an Ethernet Port
124
Adding an Ethernet Port to Specified Vlans
126
Configuring Ethernet Ports
126
Making Basic Port Configuration
126
Setting the Ethernet Port Broadcast Suppression Ratio
127
Enabling Flow Control on a Port
127
Configuring Access Port Attribute
128
Configuring Hybrid Port Attribute
128
Configuring Trunk Port Attribute
129
Copying Port Configuration to Other Ports
129
Setting Loopback Detection for an Ethernet Port
130
Configuring the Ethernet Port to Run Loopback Test
131
Enabling the System to Test Connected Cable
132
Displaying and Debugging Ethernet Port
132
Ethernet Port Configuration Example
133
Troubleshooting Ethernet Port Configuration
133
Link Aggregation
134
Section 8
135
Chapter 1 Link Aggregation Configuration
136
Introduction to Link Aggregation
136
Aggregation Group Categories
137
Link Aggregation Configuration
138
Configuring a Manual Aggregation Group
138
Displaying and Debugging Link Aggregation
139
Link Aggregation Configuration Example
139
Port Isolation
141
Port Isolation Configuration
143
Port Isolation Overview
143
Port Isolation Configuration Example
144
Mac Address Forwarding Table
146
Section 9
147
Chapter 1 MAC Address Table Management
148
Overview
148
Introduction to MAC Address Table
148
Entries in a MAC Address Table
148
MAC Address Learning Mechanism
149
Aging Time of MAC Address Entries
150
Limitations on the Number of MAC Addresses Learnt
150
MAC Address Table Management
151
Configuring a MAC Address Entry and the Aging Time
151
Setting the Maximum Number of MAC Addresses a Port Can Learn
151
Configuration Example
152
Displaying and Maintaining a MAC Address Table
152
Section 10
155
Chapter 1 MSTP Configuration
157
Mstp Overview
157
MSTP Protocol Data Unit
157
Basic MSTP Terminologies
158
Implementation of MSTP
161
MSTP Implementation on Switches
163
Root Bridge Configuration
163
Prerequisites
164
MST Region Configuration
164
Root Bridge/Secondary Root Bridge Configuration
166
Bridge Priority Configuration
168
MSTP Operation Mode Configuration
169
MST Region Maximum Hops Configuration
170
Network Diameter Configuration
171
MSTP Time-Related Configuration
171
Timeout Time Factor Configuration
174
Maximum Transmitting Speed Configuration
174
Edge Port Configuration
176
Point-To-Point Link-Related Configuration
177
MSTP Configuration
180
Leaf Node Configuration
180
Prerequisites
181
MST Region Configuration
181
MSTP Operation Mode Configuration
181
Timeout Time Factor Configuration
182
Maximum Transmitting Speed Configuration
182
Edge Port Configuration
182
Path Cost Configuration
182
Port Priority Configuration
185
Point-To-Point Link-Related Configuration
186
MSTP Configuration
186
The Mcheck Configuration
186
Prerequisites
186
Configuration Example
187
Protection Function Configuration
188
Introduction
188
BPDU Protection Configuration
189
Root Protection Configuration
190
Loop Prevention Configuration
191
TC-BPDU Attack Prevention Configuration
192
Digest Snooping Configuration
192
Introduction
192
Digest Snooping Configuration
193
Rapid Transition Configuration
194
Introduction
194
Rapid Transition Configuration
196
MSTP Displaying and Debugging
197
MSTP Implementation Example
197
Section 11
202
Chapter 1 802.1X Configuration
203
Architecture of 802.1X Authentication
203
The Mechanism of an 802.1X Authentication System
205
Encapsulation of Eapol Messages
205
Authentication Procedure
208
Timer
211
Implementation on an S3100 Series Switch
212
Configuration
214
Basic 802.1X Configuration
215
Configuring Basic 802.1X Functions
215
Prerequisites
215
Timer and Maximum User Number Configuration
217
Advanced 802.1X Configuration
218
Configuring Proxy Checking
219
Prerequisites
219
Configuring Client Version Checking
220
Enabling DHCP-Triggered Authentication
220
Configuring Guest VLAN
221
Displaying and Debugging 802.1X
221
Configuration Example
222
Chapter 2 HABP Configuration
226
Introduction to HABP
226
Habp Server Configuration
226
HABP Client Configuration
227
Displaying and Debugging HABP
227
Chapter 3 System-Guard Configuration
228
System-Guard Overview
228
System-Guard Configuration
228
Configuring System-Guard-Related Parameters
228
Enabling the System-Guard Function
228
Specifying System-Guard-Enabled Ports
228
Displaying and Debugging the System-Guard Function
229
System-Guard Configuration Example
229
Section 12
232
Chapter 1 AAA&RADIUS Configuration
233
Introduction to Aaa
233
Introduction to ISP Domain
234
Introduction to RADIUS
234
AAA Configuration
240
Configuration Prerequisites
241
Creating an ISP Domain
242
Configuring the Attributes of an ISP Domain
242
Configuring an AAA Scheme for an ISP Domain
243
Configuration Tasks
240
Dynamic VLAN Assignment Configuration
246
Configuring Dynamic VLAN Assignment
246
Configuring the Attributes of a Local User
247
Cutting down User Connection Forcibly
249
RADIUS Configuration
249
Creating a RADIUS Scheme
250
Configuring RADIUS Authentication/Authorization Servers
250
Configuring RADIUS Accounting Servers
251
Configuring Shared Keys for RADIUS Packets
253
Configuring the Maximum Number of Transmission Attempts of RADIUS Requests
254
Configuring the Supported RADIUS Server Type
255
Configuring the Status of RADIUS Servers
255
Configuring the Attributes for Data to be Sent to RADIUS Servers
256
Configuring a Local RADIUS Authentication Server
257
Configuring the Timers of RADIUS Servers
258
Configuring Whether or Not to Send Trap Message When RADIUS Server Is down
259
Configuring the User Re-Authentication Upon Device Restart Function
260
Displaying AAA&RADIUS Information
261
AAA&RADIUS Configuration Example
262
Remote RADIUS Authentication of Telnet/Ssh Users
262
Local Authentication of Ftp/Telnet Users
264
Troubleshooting AAA&RADIUS Configuration
265
Centralized Mac Address Authentication
267
Section 13
268
Centralized MAC Address Authentication Overview
269
Chapter 1 Centralized MAC Address Authentication Configuration
269
Centralized MAC Address Authentication Configuration
270
Enabling Centralized MAC Address Authentication Globally and for a Port
270
Configuring Centralized MAC Address Authentication Mode
271
Configuring a User Name and Password to be Used in Fixed Mode
271
Configuring the ISP Domain for MAC Address Authentication Users
271
Configuring the Timers Used in Centralized Mac Address Authentication
272
Displaying and Debugging Centralized MAC Address Authentication
272
Centralized MAC Address Authentication Configuration Example
273
Section 14
276
Chapter 1 ARP Configuration
277
Introduction to ARP
277
Necessity of the Address Resolution
277
ARP Packet Structure
277
ARP Table
278
ARP Implementation Procedure
279
Introduction to Gratuitous ARP
280
ARP Configuration
281
Adding a Static ARP Mapping Entry Manually
281
Configuring the ARP Aging Timer for Dynamic ARP Entries
282
Enabling the ARP Entry Checking Function
282
Gratuitous ARP Packet Learning Configuration
282
Configuring Sending of Gratuitous ARP Packets
282
Configuring the Gratuitous ARP Packet Learning Function
282
Displaying and Debugging ARP
283
Section 15
285
Chapter 1 DHCP-Snooping Configuration
286
DHCP-Snooping Overview
286
Implementation of the DHCP-Snooping Function
286
DHCP-Snooping Entry Updating
287
DHCP-Snooping Configuration
288
Enabling the DHCP-Snooping Function
288
Displaying DHCP-Snooping
288
Section 16
290
Chapter 1 ACL Configuration
291
Introduction to ACL
291
ACL Implementation Mode on Switch
291
ACL Supported by S3100 Series Switches
292
Time Range Configuration
292
Configuration Procedure
293
Configuration Example
293
Time Range-Based ACL
292
Introduction to Time Range
292
Implementation of Time Range-Based ACL
292
ACL Configuration
294
Prerequisites
294
Creating a Basic ACL
294
Creating an Advanced ACL
294
Configuration Example
298
Section 17
301
Chapter 1 Qos Configuration
303
Qos Overview
303
Qos Functions and Related Commands
305
Configuring Port Priority
306
Configuration Procedure
307
Configuration Example
307
Configuring Packet Trust Priority
307
Configuration Example
308
Configuring Priority - Local Precedence Queue Mapping
308
Prerequisites
308
Configuring "802.1P Priority - Local Precedence Queue" Mapping Table
308
Configuring "IP Precedence - Local Precedence Queue" Mapping Table
309
Configuring "DSCP Precedence - Local Precedence Queue" Mapping Table
310
Configuration Example
310
Configuring Packet Priority
311
Prerequisites
311
Configuration Procedure
311
Configuration Example
312
Configuring Queue Scheduling Algorithm
313
Prerequisites
313
Configuration Procedure
313
Configuration Example
313
Configuring Local Port Monitoring
314
Prerequisites
314
Configuration Procedure
314
Configuration Example
315
Configuring RSPAN
316
Prerequisites
317
Configuration Procedure on the Source Switch
318
Configuration Procedure on the Intermediate Switch
319
Configuration Procedure on the Destination Switch
319
Configuration Example
320
Setting Rate Limit on Ports
322
Prerequisites
322
Configuration Procedure
322
Configuration Example
323
Configuring Unknown Multicast Packet Discarding
324
Displaying and Maintaining Qos
324
Igmp Snooping
326
Section 18
327
Chapter 1 IGMP Snooping Configuration
328
Overview of IGMP Snooping
328
IGMP Snooping Fundamentals
328
IGMP Snooping Configuration
332
Enabling IGMP Snooping
332
Configuring Timers
333
Enabling IGMP Fast Leave Processing
333
Configuring IGMP Snooping Filtering ACL
334
Configuring Multicast VLAN
335
Displaying Information about IGMP Snooping
337
IGMP Snooping Configuration Example
337
Example 1
337
Example 2
338
Troubleshooting IGMP Snooping
341
Chapter 2 Routing Port Join to Multicast Group Configuration
342
Routing Port Join to Multicast Group Configuration
342
Configuring a Multicast Mac Address Entry
343
Displaying Multicast MAC Address Configuration
344
Section 19
346
Chapter 1 Stack
347
Stack Function Overview
347
The Main Switch of a Stack
347
The Slave Switches of a Stack
347
Creating a Stack
348
Main Switch Configuration
348
Configuring the IP Address Pool and Creating the Stack
348
Switching to Slave Switch View
349
Slave Switch Configuration
350
Displaying and Debugging a Stack
350
Stack Configuration Example
351
Chapter 2 Cluster
353
Cluster Overview
353
Introduction to Cluster
353
Cluster Roles
354
Introduction to NDP
355
Introduction to Cluster Roles
356
Introduction to NTDP
356
Management Device Configuration
357
Enabling NDP Globally and for Specific Ports
357
Configuring NDP-Related Parameters
358
Configuring NTDP-Related Parameters
358
Enabling NTDP Globally and for Specific Ports
358
Enabling the Cluster Function
359
Configuring Cluster Parameters
360
Member Device Configuration
361
Enabling NDP Globally and for Specific Ports
361
Enabling NTDP Globally and for Specific Ports
361
Intra-Cluster Configuration
362
Displaying and Maintaining a Cluster
363
HGMP V2 Configuration Example
364
Section 20
368
Chapter 1 SNMP Configuration
369
SNMP Overview
369
SNMP Operation Mechanism
369
SNMP Versions
369
Mibs Supported by the Device
370
Configuring SNMP Basic Functions
371
Configuring Trap
374
Configuration Prerequisites
374
Configuration Tasks
374
Displaying SNMP
375
SNMP Configuration Example
376
Section 21
379
Chapter 1 RMON Configuration
380
Introduction to RMON
380
Working Mechanism of RMON
380
Commonly Used RMON Groups
381
RMON Configuration
382
Configuring RMON
382
Displaying and Debugging RMON
383
RMON Configuration Example
384
Section 22
387
Chapter 1 NTP Configuration
388
Introduction to NTP
388
Applications of NTP
388
Working Principle of NTP
389
NTP Implementation Mode
390
NTP Implementation Mode Configuration
392
Prerequisites
393
Configuring NTP Implementation Modes
393
Access Control Permission Configuration
395
NTP Authentication Configuration
395
Configuring NTP Authentication
396
Configuration of Optional NTP Parameters
398
Configuration Example
399
NTP Server Mode Configuration
399
NTP Peer Mode Configuration
401
NTP Broadcast Mode Configuration
403
NTP Multicast Mode Configuration
405
NTP Server Mode with Authentication Configuration
407
Displaying and Debugging NTP
399
Section 23
411
Chapter 1 SSH Terminal Services
412
SSH Terminal Services
412
Introduction to SSH
412
SSH Server Configuration
414
SSH Client Configuration
418
Displaying SSH Configuration
419
SSH Server Configuration Example
420
SSH Client Configuration Example
422
SFTP Service
423
SFTP Overview
423
SFTP Server Configuration
424
SFTP Client Configuration
425
SFTP Configuration Example
428
File System Management
432
Section 24
433
Chapter 1 File System Management
434
File Attribute Configuration
434
Introduction to File Attributes
434
Configuring File Attributes
435
File System Configuration
436
Introduction to File System
436
Introduction to Configuration File Management
437
Directory Operations
437
File Operations
438
Storage Device Operations
441
Prompt Mode Configuration
441
Configuration Example
442
Section 25
445
Chapter 1 FTP and TFTP Configuration
446
FTP Configuration
446
Introduction to FTP
446
FTP Configuration: a Switch Operating as an FTP Server
448
FTP Configuration: a Switch Operating as an FTP Client
449
Configuration Example: a Switch Operating as an FTP Client
451
Configuration Example: a Switch Operating as an FTP Server
453
TFTP Configuration
454
Introduction to TFTP
454
TFTP Configuration
456
Configuration Example
456
Information Center
459
Section 26
460
Information Center Overview
461
Chapter 1 Information Center
462
Information Center Configuration
464
Enabling Synchronous Terminal Output
465
Enabling Information Output to a Log Host
466
Enabling Information Output to the Console
467
Enabling Information Output to a Monitor Terminal
468
Enabling Information Output to the Log Buffer
470
Enabling Information Output to the Trap Buffer
471
Enabling Information Output to the SNMP
472
Displaying and Debugging Information Center
472
Information Center Configuration Examples
473
Log Output to a Unix Log Host
473
Log Output to a Linux Log Host
475
Log Output to the Console
477
System Maintenance and Debugging
478
Section 27
479
Chapter 1 Bootrom and Host Software Loading
481
Introduction to Loading Approaches
481
Local Software Loading
481
Boot Menu
482
Loading Software Using XMODEM through Console Port
483
Loading Software Using TFTP through Ethernet Port
488
Loading Software Using FTP through Ethernet Port
489
Remote Software Loading
491
Remote Loading Using FTP
491
Remote Loading Using TFTP
493
Basic System Configuration
494
Setting the Date and Time of the System
494
Setting the System Name of the Switch
494
Returning from Current View to Lower Level View
495
Setting the CLI Language Mode
495
Setting the Local Time Zone
495
Setting the Summer Time
495
Entering System View from User View
496
Returning from Current View to User View
496
Displaying the System Status
496
System Debugging
497
Enabling/Disabling System Debugging
497
Displaying Operating Information about Modules in System
499
Chapter 3 IP Performance Configuration
500
IP Performance Configuration
500
Configuring TCP Attributes
500
Introduction to TCP Attributes
500
Displaying and Debugging IP Performance
501
Troubleshooting the IP Performance Configuration
501
Chapter 4 Network Connectivity Test
503
Network Connectivity Test
503
Ping
503
Tracert
503
Chapter 5 Device Management
505
Introduction to Device Management
505
Device Management Configuration
505
Enabling the Timing Reboot Function
505
Restarting the Ethernet Switch
505
Specifying the APP Adopted When the Switch Starts Next Time
506
Updating the Bootrom
506
Displaying the Device Management Configuration
507
Remote Switch Update Configuration Example
507
Advertisement
Advertisement
Related Products
Huawei Quidway S3928F-EI
Huawei Quidway S3928P-SI
Huawei Quidway S3928P-EI
Huawei Quidway S3952P-EI
Huawei Quidway S3928P-E
Huawei Quidway S3000 Series
Huawei Quidway S3700-28TP-EI-24S-AC
Huawei Quidway S3700-28TP-SI-AC
Huawei Quidway S3700-52P-EI-DC
Huawei Quidway S3700-52P-EI-24S-AC
Huawei Categories
Cell Phone
Network Router
Wireless Router
Modem
Network Hardware
More Huawei Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL